ettysal
play

ETTYSAL Ending Terrorism through Tunisian Youth Service Action - PowerPoint PPT Presentation

ETTYSAL Ending Terrorism through Tunisian Youth Service Action Locally 2018 WORLD CONGRESS ON JUSTICE FOR CHILDREN Strengthening justice systems for children: Challenges, including disengagement from violent extremism UNESCO HOUSE PARIS 28th -


  1. ETTYSAL Ending Terrorism through Tunisian Youth Service Action Locally 2018 WORLD CONGRESS ON JUSTICE FOR CHILDREN Strengthening justice systems for children: Challenges, including disengagement from violent extremism UNESCO HOUSE PARIS 28th - 30th MAY 2018 Halima Bali Mrad Tunisia Country Representative

  2. Contents • Introduction • The Model • YSET Adaptation: Tool Refinement and Threshold Setting • CVE AYSET Risk Factors • Youth Behavioral Profile for Referral • Family-Centered Intervention • Most Common Problems in ETTYSAL Youth • Examples of Adapted Solutions • ETTYSAL Results • Lessons Learned

  3. Introduction • Period of performance: 18 months • Award amount: 1,000,000 • Target population: Youth ages 13-25 • Location: Manouba and Kasserine • Participants: Direct beneficiaries 100 youth and their families; Indirect beneficiaries Kasserine • Partners: University of Southern California, University of Tunis, University of Zitouna, National Youth Observatory, Amal Association, Fanni Raghman Anni, IIDebate Manouba

  4. The Model Theory of Change: ETTYSAL’s Theory of Change is based on building community capacity to identify and modify the behavior of youth at high risk of joining Violent Extremist Organizations (VEOs). Risk factors and associated behaviors are embedded in, and reinforced by the family’s relational interactions/dynamics. If behaviors associated with risk factors are identified and used as a lever to engage significant members of the family in changing those behaviors, relational sequences are improved and risk factors and associated behaviors are reduced/changed. Family Systems Prevention and Intervention Model Two interrelated steps: Diagnostic phase (through the application of the AYSET) Family counseling

  5. YSET Adaptation: Tool refinement and threshold setting • Pilot with 10 youth to analyze scores • 6 out of 12 risk factors makes a youth eligible for the intervention • Gang YSET has 9 nine risk factors. 4 out 9 risk factors makes a youth eligible for secondary prevention services. • Adapted tool used to test a total of 600 youth from Manouba and Kasserine

  6. CVE AYSET Risk Factors Adaptation of Risk Factors/ Scales A, B, C, DE, F, G, IJ, H, T SCALE A : Antisocial Tendencies SCALE B : Weak Parental Supervision SCALE C : Critical Life Events 9 YSET Risk factors kept with SCALE: DE : Impulsive Risk Taking adaptation SCALE F : Neutralization of Guilt SCALE G : Peer Influence SCALE IJ : Deviant Behaviors SCALE T : Family radicalization SCALE H: Influence of Radical Peers Addition of Risk Factors/Scales SV, R1, R2 SCALE SV : Social Vulnerability 3 AYSET Risk factors SCALE R1 : Religious Extremism - Concerning behaviors Added for CVE SCALE R2 : Religious Extremism - Alarming behaviors

  7. Youth Behavioral Profile for Referral • Isolation from family and community • Spending extensive amounts of time alone in cafes or in the streets • Spending large amounts of time on social networks • Sudden change in habits/spending too much time in mosques • Viewing violent postings • Adopting deviant behaviors • Dropping out of school • Displaying violent behaviors towards the police • Negative discourse towards local government officials • Entertaining relations with VEO recruiters • No effort to find a job • Showing radical and violent behaviors • Drug and alcohol abuse

  8. Family-Centered Intervention

  9. Counseling Per Phase • Vertical Strategy  Construction of the genogram • Horizontal Strategy  Stages of problem-solving Problems Solutions

  10. Why the Use of the Genogram? • Help families identify their strengths and weaknesses across generations; • Help the counselor understand the links, the influences and vulnerabilities of the individuals and the conflicts inside the group; • Help the counselor understand the attachment system that establishes the relational matrix, the harmonious, difficult or fusional relationships; • Allow to consider the pattern of functioning of the family as a whole; • Highlight all the major events that have affected them (births, marriages, separations, divorces, major diseases, death, job failures, etc.)

  11. Steps for Problem-Solving • Announce to the family the strategies put in place with the strategy team Step 1 • Establish clear definition of the problem (the behavior must be separated from the identity) Step 2 Step 3 • Identify the solutions tested Step 4 • Establish clear indicators of change in behavior Step 5 • Choose an intervention based on a well defined hypothesis Step 6 • Assign tasks (simple and feasible)

  12. Family Radicalization The ETTYSAL model is based on the powerful finding that the «Family is the channel of culture and beliefs!» Family Counselors identified mothers as a key partner to recognize, predict, and address exposures to VE. • Family Counselors empowered mothers to offer expressive counternarratives to dehumanize extremist acts; Fathers and male family members are central in reframing philosophies of masculinity that VE narratives are using to manipulate youth. • Family Counselors emphasized fathers’ participation to de -construct such beliefs and narratives by promoting family values.

  13. Impulsive Risk Taking Impulsive risk taking is a cognitive vulnerability factor used by VEOs • Family Counselors supported youth through co-regulation techniques to put in place adapted alternative behaviors; • Family intervention reduced the severity of these traits by increasing control over behaviors and insistence toward adapted goals, such as social accomplishments and educational commitments; • Family Counselors provided youth life opportunities, helping them discover their skills and talents and how to act in a constructive manner;

  14. Most Common Problems in ETTYSAL Youth

  15. ETTYSAL Results AYSET-T1 to AYSET-T3 (12 months) 28.762 A - Antisocial Tendencies 15.60 21.9 26.368 B - Weak Parental Supervision 14.43 19.6 8.013 C - Critical Life Events 13.21 14.36 45.850 DE - Impulsive Risk Taking 8.25 15.24 39.516 F - Neutralization Of Guilt 16.99 28.09 24.457 G - Peer Influence 10.15 % CHANGE 13.44 AYSET-T3 12.467 IJ - Deviant Behaviors 44.75 51.12 AYSET-T1 21.760 H - Peer Radicalization Influence 7.88 10.07 84.301 T - Family Radicalization 0.12 0.78 20.151 R1 - Religious Extremism 1 (Concerning Behaviors) 16.31 20.43 30.524 R2 - Religious Extremism 2 (Worrying Behaviors) 25.43 36.6 21.185 SV - Social_Vulnerability 33.62 42.66 0 10 20 30 40 50 60 70 80 90

  16. ETTYSAL Results Number of Eligible N of youth who have risk factors at the end of Youth/Number of youth the program 95% youth are no 5 youth have 1 risk factor, MORANGUIA 0/20 longer at the 1 youth have 2 risk factors 8 youth have 1 risk factor, secondary level of 5 youth have 2 risk factors, DOUARHICHER 0/30 6 youth have 3 risk factors, risk 1 youth have 5 risk factors 1 youth have 1 risk factor, 4 youth have 2 risk factors, 3 youth have 3 risk factors, EZZOUHOUR 3/17 1 youth have 4 risk factors, 3 youth have 5 risk factors, 1 youth have 6 risk factors, 2 youth have 7 risk factors 5 youth have 1 risk factor, 5 youth have 2 risk factors, ESSOUROUR 1/16 4 youth have 3 risk factors, 1 youth have 5 risk factors, 1 youth have 7 risk factors 5 youth have 1 risk factor, 2 youth have 2 risk factors, ELKARMA 1/16 1 youth have 4 risk factors, 3 youth have 5 risk factors, 1 youth have 6 risk factors Total 5

  17. Lessons learned • Approaches from youth violence prevention field are relevant for P/CVE • Public health model is important for addressing P/CVE • P/CVE programs to target individuals must be grounded on data and evidence • Families are a key actor in P/CVE • Focus on behaviors not identity • Youth should be seen as the solution • Strong demand for the program

  18. QUESTIONS?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend